cybersecsi / houdiniLinks
Hundreds of Offensive and Useful Docker Images for Network Intrusion. The name says it all.
β1,245Updated last year
Alternatives and similar repositories for houdini
Users that are interested in houdini are comparing it to the libraries listed below
Sorting:
- A repo to automatically generate and keep updated a series of Docker images through GitHub Actions.β557Updated this week
- π A curated list of awesome Docker security resourcesβ693Updated 5 months ago
- A deliberately vulnerable CI/CD environment. Learn CI/CD security through multiple challenges.β2,157Updated last year
- Granular, Actionable Adversary Emulation for the Cloudβ2,194Updated this week
- Automating situational awareness for cloud penetration tests.β2,241Updated last week
- Checklist for container security - devsecops practicesβ1,602Updated 2 months ago
- β573Updated 2 years ago
- dnsReaper - subdomain takeover tool for attackers, bug bounty hunters and the blue team!β2,168Updated last month
- Open Source Security Guide. Learn all about Security Standards (FIPS, CIS, FedRAMP, FISMA, etc.), Frameworks, Threat Models, Encryption, β¦β1,023Updated 4 months ago
- a drop-in replacement for Nmap powered by shodan.ioβ3,138Updated 6 months ago
- log4jScanner provides the ability to scan internal subnets for vulnerable log4j web servicesβ489Updated 2 years ago
- π¦π Awesome list of secrets in environment variables π₯οΈβ899Updated 3 years ago
- This is a step-by-step guide to implementing a DevSecOps program for any size organizationβ2,015Updated 11 months ago
- Automated pentest reporting with custom templates, project tracking, customer dashboard and client management tools. Streamline your secuβ¦β1,051Updated this week
- Detector for Log4Shell exploitation attemptsβ728Updated 3 years ago
- RedEye is a visual analytic tool supporting Red & Blue Team operationsβ2,732Updated 2 years ago
- A log4j vulnerability filesystem scanner and Go package for analyzing JAR files.β1,571Updated 3 years ago
- My cheatsheet notes to pentest AWS infrastructureβ695Updated 3 years ago
- An open-source tool for auditing your software supply chain stack for security compliance based on a new CIS Software Supply Chain benchmβ¦β763Updated 11 months ago
- Quickly discover exposed hosts on the internet using multiple search engines.β2,743Updated this week
- A curated list of awesome CI CD security resourcesβ789Updated last month
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.β1,470Updated 3 years ago
- Automated Red Team Infrastructure deployement using Dockerβ1,253Updated 3 years ago
- log4j-scanner is a project derived from other members of the open-source community by CISA to help organizations identify potentially vulβ¦β1,282Updated 2 years ago
- β364Updated 2 years ago
- Vulnerable app with examples showing how to not use secretsβ1,370Updated last week
- Peirates - Kubernetes Penetration Testing toolβ1,388Updated 3 months ago
- Vulnerability Intelligence Platformβ2,316Updated last week
- all paths lead to cloudsβ638Updated 2 years ago
- OWASP dep-scan is a next-generation security and risk audit tool based on known vulnerabilities, advisories, and license limitations for β¦β1,183Updated this week